#### Filter Results:

- Full text PDF available (27)

#### Publication Year

2003

2017

- This year (2)
- Last 5 years (27)
- Last 10 years (41)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Nuttapong Attrapadung, Hideki Imai
- Pairing
- 2009

- Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu
- Public Key Cryptography
- 2011

Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained access control on encrypted data. In its key-policy flavor, the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt.… (More)

- Nuttapong Attrapadung
- EUROCRYPT
- 2014

Dual system encryption techniques introduced by Waters in Crypto’09 are powerful approaches for constructing fully secure functional encryption (FE) for many predicates. However, there are still some FE for certain predicates to which dual system encryption techniques seem inapplicable, and hence their fully-secure realization remains an important problem.… (More)

- Nuttapong Attrapadung, Hideki Imai
- IMA Int. Conf.
- 2009

- Nuttapong Attrapadung, Benoît Libert
- Public Key Cryptography
- 2010

In functional encryption (FE) schemes, ciphertexts and private keys are associated with attributes and decryption is possible whenever key and ciphertext attributes are suitably related. It is known that expressive realizations can be obtained from a simple FE flavor called inner product encryption (IPE), where decryption is allowed whenever ciphertext and… (More)

- Nuttapong Attrapadung
- IACR Cryptology ePrint Archive
- 2015

We propose a new generic framework for achieving fully secure attribute based encryption (ABE) in prime-order bilinear groups. It is generic in the sense that it can be applied to ABE for arbitrary predicate. All previously available frameworks that are generic in this sense are given only in composite-order bilinear groups, of which operations are known to… (More)

- Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
- Public Key Cryptography
- 2011

In this paper we propose generic conversions for transforming a chosen-plaintext (CPA) secure attribute-based encryption (ABE) to a chosen-ciphertext (CCA) secure ABE. The only known generic conversion, to the best of our knowledge, was presented by Goyal et al. in ACM-CCS 2006, which itself subsumes the well-known IBE-to-PKE conversion by Canetti, Halevi,… (More)

- Nuttapong Attrapadung, Benoît Libert, Thomas Peters
- ASIACRYPT
- 2012

Homomorphic signatures are primitives that allow for public computations on authenticated data. At TCC 2012, Ahn et al. defined a framework and security notions for such systems. For a predicate P , their notion of P -homomorphic signature makes it possible, given signatures on a message set M , to publicly derive a signature on any message m′ such that P… (More)

- Nuttapong Attrapadung, Hideki Imai
- ACNS
- 2009

- Nuttapong Attrapadung, Benoît Libert
- Public Key Cryptography
- 2011

Network coding is known to provide improved resilience to packet loss and increased throughput. Unlike traditional routing techniques, it allows network nodes to perform transformations on packets they receive before transmitting them. For this reason, packets cannot be authenticated using ordinary digital signatures, which makes it difficult to hedge… (More)